Research Article
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
(1) Eavesdrop the login request message during the login phase, | where and . | (2) Call oracle on input to retrieve the information , and as . | (3) Using the retrieved information and , compute , which needs to be . | (4) Call oracle on the computed input to retrieve the secret number of the | server as . | (5) if then | (6) Accept as the correct secret number of the server . | (7) return 1 (Success) | (8) else | (9) return 0 (Failure) | (10) end if |
|